IBM Support's response is to push you to the blog
https://www.ibm.com/blogs/psirt/

Which then references the link below. Nothing in the link below tells me anything about the IBM i specifically. I added the environment variable and restarted DB2 Web Query. But beyond that, the steps are Greek to me.

The only application we have externally facing is DB2 Web Query. I asked if it was affected... support just keeps reiterating "our only communication is via the blog"

I have never seen IBM support so "evasive" about an issue.

-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Rob Berendt
Sent: Monday, December 13, 2021 9:50 AM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: RE: Remote code execution exploit found in Log4j - CVE-2021-44228

Well does "Admin applications" include "WebSphere Application Server Admin Console"?

If so then:
<snip>
There is a vulnerability in the Apache Log4j open source library used by WebSphere Application Server. This affects the WebSphere Application Server Admin Console and the UDDI Registry Application. This vulnerability has been addressed.
</snip>
https://www.ibm.com/support/pages/node/6525706

Operating system(s):
AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS

Rob Berendt

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.